Online Data Security Term Paper

PAGES
4
WORDS
1264
Cite

Cloud computing presents and represents a large amount of opportunity to expand and improve the manner in which information systems, computing and usage of internet technology is managed. However, as recent hacks and exploits have pointed out, cloud computing is far from a panacea and presents a large amount of new problems due to hackers, thieves and opportunists using the new technology to find new ways to victimize and snoop on people. While there are risks to cloud computing, the goods and potential goods far outweigh the bad but users need to be responsible, vigilant and careful. As made clear in the introduction, cloud computing allows for some great new things but security is a concern that, while present in regular computing as well, is amplified greatly when talking about cloud computing due to the increase level of access and ability for any random internet user with the right password of tools to gain access. Selecting a cloud computing vendor is something that should be done with great care and consideration because a company that is being cheap about security is going to get caught red-handed and even some of the giants of computing and commerce have fallen prey to this. Examples of this, while not cloud computing companies, include Chase, Home Depot, Target, Michaels and so forth. Most cloud computing giants have avoided such problems and scandals. However, it is only a matter of time and any careless user of even the most rock-solid cloud computing companies can get their account compromised due to a weak password or something else careless (Samson, 2013).

Large companies need cloud computing as they are much more likely to have people dispersed all over the place and they are also much more likely to be handling a huge amount of data that would be extremely damaging were it to be easily accessible or spreadable. Medium- to smaller firms need cloud computing as it gives them a level of access and use that would require some...

...

Just about anyone can slap together a computer server and make it visible to the internet. There are even free programs like TeamViewer that allow for that. However, cloud computing vendors can usually provide these services much cheaper and with a much higher level of service. Finally, we have the personal consumer applications and options for cloud computing with perhaps the most obvious examples being smartphone portals and applications like Android/Gmail and the Apple plethora of software. There are also other file and application repositories for small-budget people like tablets that use cell phone tower technology, Dropbox, cheaper NAS servers, personal server software (e.g. Windows Home Server 2011) and so on. Even regular consumers can truly use some high-end technology for free or no more than a nominal cost. It all depends what the user wants to do and how much they are wanting to spend. The scalability and customizability of even widely-used software is quite extensive in the modern cloud computing marketplace (Samson, 2013).
Security vulnerabilities do not always come from direct hacks although that is always a possibility with data that is accessible from any online terminal or workstation. Vulnerabilities and problems include denial of service (DoS) attacks, distributed denial of service attacks, password guessing (automated or manual), social engineering, lack lf encryption and/or passwords on laptops and tablets, not locking terminals when stepping away, lackadaisical hiring practices and so on. Just as the threats are multi-faceted, the protections are multi-dimensional as well. Solutions to prevent or at least limit damages from hacking and other nefarious acts include lock-out timers, encryption on a machine itself or as it communicates on the internet (e.g. VPN's, etc.), being careful over who is hired and retained, coming down on people that do…

Sources Used in Documents:

References

Davis, M. (2013, January 18). 4 Steps For Proactive Cybersecurity - InformationWeek. InformationWeek. Retrieved October 19, 2014, from http://www.informationweek.com/government/cybersecurity/4-steps-for-proactive-cybersecurity/d/d-id/1108270?

Gross, G. (2013, May 3). Veteran tech workers see themselves locked out of job market [infographic]. PCWorld. Retrieved October 19, 2014, from http://www.pcworld.com/article/2037161/veteran-tech-workers-see-themselves-locked-out-of-job-market.html

Samson, T. (2013, February 25). 9 top threats to cloud computing security. InfoWorld. Retrieved October 19, 2014, from http://www.infoworld.com/article/2613560/cloud-security/9-top-threats-to-cloud-computing-security.html

Zetter, K. (1923, March 10). TJX Hacker Gets 20 Years in Prison | WIRED. Wired.com. Retrieved October 19, 2014, from http://www.wired.com/2010/03/tjx-sentencing/


Cite this Document:

"Online Data Security" (2014, October 19) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/online-data-security-192871

"Online Data Security" 19 October 2014. Web.26 April. 2024. <
https://www.paperdue.com/essay/online-data-security-192871>

"Online Data Security", 19 October 2014, Accessed.26 April. 2024,
https://www.paperdue.com/essay/online-data-security-192871

Related Documents

Company's Data Needs Data protection is an important aspect of modern day businesses and organizations because data is the lifeblood of their business and operations. Some of the major examples of a company's data include financial information, legal records, and customer information. Given the significance of this type of information, it is increasingly critical for a company to protect its data in order to guarantee successful operations. In the recent past,

Data Security and Privacy
PAGES 2 WORDS 649

Security and Privacy Five Central Concerns About Data Security and Privacy The five central concerns about data security and privacy that are the most common in personal and business use of computers are presented in this paper. Password security, the need companies have to keep their employees up-to-date with security training, and defining checks and balances to make sure information is not compromised are the three most important according to research.

Even though there is always some form of a risk involved in the coding technique together with the deployment methods of a website, some technologies such as PHP and MySQL form some of the worst aggravators of online website security. The loopholes that exists in the use of these technologies results in some of the worst hack attacks and security breaches ever experienced in the field of web design. The

It's a tidal wave that's going to engulf us all within the next five years. Cloud services will be a $160 billion industry by the end of 2011" (Ginovsky 2011, 21). Although the decision to transition from a traditional approach to cloud computing will depend on each organization's unique circumstances, a number of general benefits have been cited for those companies that have made the partial or complete transition to

Security Breach Case Scenario 1: Security Breach Hospitals have the opportunity and responsibility to integrate sound policies and procedures in relation to the protection of the confidential client information (Rodwin, 2010). St. John's Hospital in no different to this notion has the organization seeks to enhance the security and confidentiality of the information of its clients. The organization is a role model to other institutions within the geographical area on the essential

Data Warehousing
PAGES 10 WORDS 2601

Data Warehousing Data Warehouse technology has changed the way that global organizations conduct business. Many have found it impossible to create a business strategy without a data warehouse. The purpose of this discussion is to research and explain the importance of data warehouse management. We will begin by defining data warehouse and describing the business uses for the technology. Our discussion will then focus of data warehouse management. We will examine the